On Jul 31, 1:19 am, Jonathan Lundell <[email protected]> wrote: > > I'm suggesting (sticking with md5 for comparability): > > md5(password+random)+random > > ...where random is randomly chosen for each new password. > > You're suggesting?
How can you hash a password with a "random" salt??, the whole purpose for the authentication logic is to be able to recreate the hash in order to compare against what is stored in the database?, under this premise let's scrap the entire hashing issue and just set the passwords to str(random.random())[2:] or am I missing something here? Thx, Julio --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "web2py-users" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/web2py?hl=en -~----------~----~----~----~------~----~------~--~---

